Harry,

I don't think that it is a so called "SCAM". This person who calls himself
"THE SNIPER", I think is just having fun. The numbers that he programs into
the mbx notification is usually not an active phone number - but so far he
always uses a Philippines country/area code.

He's been doing this for about a year and a half now. One of the managers at
Panasonic claims that this guy has hacked systems all over the country and
not only Panasonic systems. He also said that Panasonic reported the hacking
to the correct authorities and that he was caught. He disappeared for a
while and recently has been at it again.

He hit another one of my customers about 2 weeks ago.

It looks like if you don't have a password on 999, then he puts in his own
password- then he creates bogus mbxs. I've seen him mostly create boxes like
444, 555,666,777,888. He then sets these boxes up to notify an invalid
number in the Philippines. He then leaves 5-10 seconds of noise as a message
for that box. - then the TVS tries to dial that Philippine phone number -
doesn't get answered and just keeps on redialing attempting to deliver the
message. A small 2 port TVS system will appear to constantly dial out on
both ports - therefor locking out the system from answering calls and
working properly.

If you do have a password on 999 that he can't hack - then it looks like he
searches for a mbx's that are already assigned and in use without having a
personal password assigned. He sets up these boxes for notification (a
feature that is controlled by the mbx owner) then assigns his own password
to that persons mbx, locking out the owner of the mbx from accessing that
mbx.

The first sign that he hit your customer is when you get a svc call that 1-2
of the users suddenly cannot access their own mbx.

Once you find one mbx that was hacked you should go into "system reports /
mbx assignments", and see which mbx's are set for notification - usually you
will see that all three devices are set up with bogus numbers.

SOLUTION - - password protect all mbx's especially 998 & 999!!! I believe
that you can use 4-10 digits for you password - I suggest using atleast 6
digits.

If your customer doesn't use any type of external message delivery then you
can set the "outgoing call setup sequence" which is under "system parameters
/ others / dialing parameters" to something like "**##", so that the TVS
will not be able to draw dialtone from the system.

You might be asking yourself how I know about all this - In the past year
and a half or so, I have encountered his work about a dozen times. I haven't
really seen him do much more damage than what I described above, and it
doesn't seem like he is doing this with the intention of somehow making any
$$$$ from doing it.

Remember - PASSWORDS, PASSWORDS, AND MORE PASSWORDS

Good luck - JOEL WEISER

-----Original Message-----
From: Harry from Select <[EMAIL PROTECTED]>
To: steve benson <[EMAIL PROTECTED]>; [EMAIL PROTECTED] <[EMAIL PROTECTED]>
Date: Thursday, November 15, 2001 7:43 PM
Subject: KX-T: Re: DISA on KXTD308


>Can someone elaborate or summarize that Philippine scam;
>where they come in and make a mailbox , set notification to dial Philippine
>number and attempt to connect 2 callers
>can some one give a breakdown or theory of this scam
>
>
>>
>>        *********************************************************
>>        *     To unsubscribe, e-mail [EMAIL PROTECTED]    *
>>        *      The KXT-Digest Home Page: http://kxthelp.com/    *
>>        *********************************************************
>>
>
>
>
>
>       *********************************************************
>       *     To unsubscribe, e-mail [EMAIL PROTECTED]    *
>       *      The KXT-Digest Home Page: http://kxthelp.com/    *
>       *********************************************************
>



       *********************************************************
       *     To unsubscribe, e-mail [EMAIL PROTECTED]    *
       *      The KXT-Digest Home Page: http://kxthelp.com/    *
       *********************************************************

Reply via email to